Page 13 of 120 results (0.009 seconds)

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Insecure file permissions for Netscape FastTrack Server 2.x, Enterprise Server 2.0, and Proxy Server 2.5 in SCO UnixWare 7.0.x and 2.1.3 allow an attacker to gain root privileges. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.08a •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the HTML parser for Netscape 4.75 and earlier allows remote attackers to execute arbitrary commands via a long password value in a form field. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:66.netscape.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000344 http://lists.suse.com/archives/suse-security-announce/2000-Nov/0005.html http://marc.info/?l=bugtraq&m=97500270012529&w=2 http://www.osvdb.org/7207 http://www.redhat.com/support/errata/RHSA-2000-109.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5542 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in IMAP server in Netscape Messaging Server 4.15 Patch 2 allows local users to execute arbitrary commands via a long LIST command. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0334.html http://www.securityfocus.com/bid/1721 https://exchange.xforce.ibmcloud.com/vulnerabilities/5292 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

The POP3 server in Netscape Messaging Server 4.15p1 generates different error messages for incorrect user names versus incorrect passwords, which allows remote attackers to determine valid users on the system and harvest email addresses for spam abuse. • http://marc.info/?l=bugtraq&m=97138100426121&w=2 http://www.securityfocus.com/bid/1787 https://exchange.xforce.ibmcloud.com/vulnerabilities/5364 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

iCal 2.1 Patch 2 installs many files with world-writeable permissions, which allows local users to modify the iCal configuration and execute arbitrary commands by replacing the iplncal.sh program with a Trojan horse. • https://www.exploit-db.com/exploits/20275 http://www.atstake.com/research/advisories/2000/a100900-1.txt http://www.osvdb.org/7212 http://www.securityfocus.com/bid/1768 https://exchange.xforce.ibmcloud.com/vulnerabilities/5756 •